Sciweavers

1627 search results - page 181 / 326
» On context in authorization policy
Sort
View
SEMWEB
2010
Springer
13 years 8 months ago
Toponym Resolution in Social Media
Increasingly user-generated content is being utilised as a source of information, however each individual piece of content tends to contain low levels of information. In addition, ...
Neil Ireson, Fabio Ciravegna
COMPSYSTECH
2009
13 years 8 months ago
Polymorphic architectures: from media processing to supercomputing
: This paper reveals the evolution of the polymorphic architectures in the context of ever increasing computational demands of the user applications and the need for formal archite...
Georgi Kuzmanov
HICSS
2007
IEEE
152views Biometrics» more  HICSS 2007»
14 years 4 months ago
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that comp...
Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Iva...
INFOCOM
2006
IEEE
14 years 4 months ago
Considering Priority in Overlay Multicast Protocols Under Heterogeneous Environments
— Hosts participating in overlay multicast applications have a wide range of heterogeneity in bandwidth and participation characteristics. In this paper, we highlight and show th...
Michael A. Bishop, Sanjay G. Rao, Kunwadee Sripani...
SAC
2004
ACM
14 years 3 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen